R18 B.Tech - .IT Syllabus IV Year

Download as pdf or txt
Download as pdf or txt
You are on page 1of 32

R18 B.Tech.

IT Syllabus JNTU HYDERABAD

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD


B.Tech. in INFORMATION TECHNOLOGY
COURSE STRUCTURE & SYLLABUS (R18)

Applicable From 2018-19 Admitted Batch

I YEAR I SEMESTER
Course
S. No. Course Title L T P Credits
Code
1 MA101BS Mathematics - I 3 1 0 4
2 CH102BS Chemistry 3 1 0 4
3 EE103ES Basic Electrical Engineering 3 0 0 3
4 ME105ES Engineering Workshop 1 0 3 2.5
5 EN105HS English 2 0 0 2
6 CH106BS Engineering Chemistry Lab 0 0 3 1.5
7 EN107HS English Language and Communication Skills Lab 0 0 2 1
8 EE108ES Basic Electrical Engineering Lab 0 0 2 1
Induction Programme
Total Credits 12 2 10 19

I YEAR II SEMESTER
Course
S. No. Course Title L T P Credits
Code
1 MA201BS Mathematics - II 3 1 0 4
2 AP202BS Applied Physics 3 1 0 4
3 CS203ES Programming for Problem Solving 3 1 0 4
4 ME204ES Engineering Graphics 1 0 4 3
5 AP205BS Applied Physics Lab 0 0 3 1.5
6 CS206ES Programming for Problem Solving Lab 0 0 3 1.5
7 *MC209ES Environmental Science 3 0 0 0
Total Credits 13 3 10 18

II YEAR I SEMESTER

Course
S. No. Course Title L T P Credits
Code
1 CS301ES Analog and Digital Electronics 3 0 0 3
2 CS302PC Data Structures 3 1 0 4
3 MA303BS Computer Oriented Statistical Methods 3 1 0 4
4 IT304PC Computer Organization and Microprocessor 3 0 0 3
5 CS305PC Object Oriented Programming using C++ 2 0 0 2
6 CS306ES Analog and Digital Electronics Lab 0 0 2 1
7 CS307PC Data Structures Lab 0 0 3 1.5
8 IT308PC IT Workshop and Microprocessor Lab 0 0 3 1.5
9 CS309PC C++ Programming Lab 0 0 2 1
10 *MC309 Gender Sensitization Lab 0 0 2 0
Total Credits 14 2 12 21

II YEAR II SEMESTER

Course
S. No. Course Title L T P Credits
Code
1 CS401PC Discrete Mathematics 3 0 0 3

1
R18 B.Tech. IT Syllabus JNTU HYDERABAD

2 SM402MS Business Economics & Financial Analysis 3 0 0 3


3 CS403PC Operating Systems 3 0 0 3
4 CS404PC Database Management Systems 3 1 0 4
5 CS405PC Java Programming 3 1 0 4
6 CS406PC Operating Systems Lab 0 0 3 1.5
7 CS407PC Database Management Systems Lab 0 0 3 1.5
8 CS408PC Java Programming Lab 0 0 2 1
9 *MC409 Constitution of India 3 0 0 0
Total Credits 18 2 8 21

III YEAR I SEMESTER


Course
S. No. Course Title L T P Credits
Code
1 CS501PC Formal Languages & Automata Theory 3 0 0 3
2 CS502PC Software Engineering 3 0 0 3
3 IT503PC Data Communication & Computer Networks 3 1 0 4
4 IT504PC Web Programming 2 0 0 2
5 Professional Elective - I 3 0 0 3
6 Professional Elective - II 3 0 0 3
7 CS505PC Software Engineering Lab 0 0 3 1.5
8 IT506PC Computer Networks & Web Programming Lab 0 0 3 1.5
9 EN508HS Advanced Communication Skills Lab 0 0 2 1
10 *MC510 Intellectual Property Rights 3 0 0 0
Total Credits 20 1 8 22

III YEAR II SEMESTER


Course
S. No. Course Title L T P Credits
Code
1 IT601PC Introduction to Embedded Systems 3 0 0 3
2 IT602PC Principles of Compiler Construction 3 0 0 3
3 IT603PC Algorithm Design and Analysis 3 0 0 3
4 IT604PC Internet of Things 3 0 0 3
5 Professional Elective –III 3 0 0 3
6 Open Elective-I 3 0 0 3
7 IT605PC Embedded Systems & Internet of Things Lab 0 0 3 1.5
8 IT606PC Compiler Construction Lab 0 0 3 1.5
9 Professional Elective-III Lab 0 0 2 1
10 *MC609 Environmental Science 3 0 0 0
Total Credits 21 0 8 22

IV YEAR I SEMESTER
Course
S. No. Course Title L T P Credits
Code
1 IT701PC Information Security 3 0 0 3
2 CS702PC Data Mining 2 0 0 2
3 Professional Elective -IV 3 0 0 3
4 Professional Elective -V 3 0 0 3
5 Open Elective-II 3 0 0 3
6 IT703PC Information Security Lab 0 0 2 1
7 IT704PC Industrial Oriented Mini Project/ Summer Internship 0 0 0 2*
8 IT705PC Seminar 0 0 2 1

2
R18 B.Tech. IT Syllabus JNTU HYDERABAD

9 IT706PC Project Stage - I 0 0 6 3


Total Credits 14 0 10 21

IV YEAR II SEMESTER
Course
S. No. Course Title L T P Credits
Code
1 SM801MS Organizational Behaviour 3 0 0 3
2 Professional Elective -VI 3 0 0 3
3 Open Elective-III 3 0 0 3
4 IT802PC Project Stage - II 0 0 14 7
Total Credits 9 0 14 16

*MC - Environmental Science – Should be Registered by Lateral Entry Students Only.


*MC – Satisfactory/Unsatisfactory

NOTE: Industrial Oriented Mini Project/ Summer Internship is to be carried out during the summer
vacation between 6th and 7th semesters. Students should submit report of Industrial Oriented Mini
Project/ Summer Internship for evaluation.

Professional Elective - I
IT511PE Biometrics
CS512PE Advanced Computer Architecture
CS513PE Data Analytics
CS514PE Image Processing
CS515PE Principles of Programming Languages

Professional Elective - II
CS521PE Computer Graphics
IT521PE Database Security
CS522PE Advanced Operating Systems
IT523PE Machine Learning
IT524PE Pattern Recognition

Professional Elective - III


IT611PE Ethical Hacking
CS612PE Network Programming
CS613PE Scripting Languages
CS614PE Mobile Application Development
CS615PE Software Testing Methodologies
#
Courses in PE - III and PE - III Lab must be in 1-1 correspondence.

Professional Elective -IV


IT711PE Web Security
IT712PE High Performance Computing
CS713PE Artificial Intelligence
CS714PE Cloud Computing
CS715PE Ad-hoc & Sensor Networks

Professional Elective -V
IT721PE Intrusion Detection Systems
CS722PE Real Time Systems
CS723PE Soft Computing
IT724PE Distributed Databases
CS725PE Software Process & Project Management

3
R18 B.Tech. IT Syllabus JNTU HYDERABAD

Professional Elective -VI


IT811PE Natural Language Processing
CS812PE Distributed Systems
CS813PE Neural Networks & Deep Learning
CS814PE Human Computer Interaction
CS815PE Cyber Forensics

4
R18 B.Tech. IT Syllabus JNTU HYDERABAD

IT701PC: INFORMATION SECURITY


IV Year B.Tech. IT I - Sem L T P C
3 0 0 3
Prerequisites: A Course on “Computer Networks and a course on Mathematics

Course Objectives:
 To understand the fundamentals of Cryptography
 To understand various key distribution and management schemes
 To understand how to deploy encryption techniques to secure data in transit across data
networks
 To apply algorithms used for secure transactions in real world applications

Course Outcomes:
 Demonstrate the knowledge of cryptography, network security concepts and applications.
 Ability to apply security principles in system design.

UNIT - I
Security Attacks (Interruption, Interception, Modification and Fabrication), Security Services
(Confidentiality, Authentication, Integrity, Non-repudiation, access Control and Availability) and
Mechanisms, A model for Internetwork security. Classical Encryption Techniques, DES, Strength of
DES, Differential and Linear Cryptanalysis, Block Cipher Design Principles and Modes of operation,
Blowfish, Placement of Encryption Function, Traffic Confidentiality, key Distribution, Random Number
Generation.

UNIT - II
Public key Cryptography Principles, RSA algorithm, Key Management, Diffie-Hellman Key Exchange,
Elliptic Curve Cryptography. Message authentication and Hash Functions, Authentication
Requirements and Functions, Message Authentication, Hash Functions and MACs Hash and MAC
Algorithms SHA-512, HMAC.

UNIT - III
Digital Signatures, Authentication Protocols, Digital signature Standard, Authentication Applications,
Kerberos, X.509 Directory Authentication Service. Email Security: Pretty Good Privacy (PGP) and
S/MIME.

UNIT - IV
IP Security: Overview, IP Security Architecture, Authentication Header, Encapsulating Security
Payload, Combining Security Associations and Key Management.
Web Security: Web Security Requirements, Secure Socket Layer (SSL) and Transport Layer Security
(TLS), Secure Electronic Transaction (SET).

UNIT - V
Intruders, Viruses and Worms Intruders, Viruses and related threats Firewalls: Firewall Design
Principles, Trusted Systems, Intrusion Detection Systems.

TEXT BOOK:
1. Cryptography and Network Security (principles and approaches) by William Stallings Pearson
Education, 4th Edition.
REFERENCE BOOKS:
1. Network Security Essentials (Applications and Standards) by William Stallings Pearson
Education.
2. Principles of Information Security, Whitman, Thomson.

123
R18 B.Tech. IT Syllabus JNTU HYDERABAD

CS702PC: DATA MINING


IV Year B.Tech. IT I - Sem L T P C
2 0 0 2
Pre-Requisites:
 A course on “Database Management Systems”
 Knowledge of probability and statistics
Course Objectives:
 It presents methods for mining frequent patterns, associations, and correlations.
 It then describes methods for data classification and prediction, and data–clustering
approaches.
 It covers mining various types of data stores such as spatial, textual, multimedia, streams.

Course Outcomes:
 Ability to understand the types of the data to be mined and present a general classification of
tasks and primitives to integrate a data mining system.
 Apply preprocessing methods for any given raw data.
 Extract interesting patterns from large amounts of data.
 Discover the role played by data mining in various fields.
 Choose and employ suitable data mining algorithms to build analytical applications
 Evaluate the accuracy of supervised and unsupervised models and algorithms.

UNIT – I
Data Mining: Data–Types of Data–, Data Mining Functionalities– Interestingness Patterns–
Classification of Data Mining systems– Data mining Task primitives –Integration of Data mining system
with a Data warehouse–Major issues in Data Mining–Data Preprocessing.

UNIT – II
Association Rule Mining: Mining Frequent Patterns–Associations and correlations – Mining
Methods– Mining Various kinds of Association Rules– Correlation Analysis– Constraint based
Association mining. Graph Pattern Mining, SPM.

UNIT – III
Classification: Classification and Prediction – Basic concepts–Decision tree induction–Bayesian
classification, Rule–based classification, Lazy learner.

UNIT – IV
Clustering and Applications: Cluster analysis–Types of Data in Cluster Analysis–Categorization of
Major Clustering Methods– Partitioning Methods, Hierarchical Methods– Density–Based Methods,
Grid–Based Methods, Outlier Analysis.

UNIT – V
Advanced Concepts: Basic concepts in Mining data streams–Mining Time–series data––Mining
sequence patterns in Transactional databases– Mining Object– Spatial– Multimedia–Text and Web
data – Spatial Data mining– Multimedia Data mining–Text Mining– Mining the World Wide Web.

TEXT BOOKS:
1. Data Mining – Concepts and Techniques – Jiawei Han & Micheline Kamber, 3rd Edition Elsevier.
2. Data Mining Introductory and Advanced topics – Margaret H Dunham, PEA.
REFERENCE BOOK:
1. Ian H. Witten and Eibe Frank, Data Mining: Practical Machine Learning Tools and Techniques
(Second Edition), Morgan Kaufmann, 2005.

124
R18 B.Tech. IT Syllabus JNTU HYDERABAD

IT711PE: WEB SECURITY (Professional Elective - IV)

IV Year B.Tech. IT I - Sem L T P C


3 0 0 3
Course Objectives:
 Give an Overview of information security
 Give an overview of Access control of relational databases

Course Outcomes: Students should be able to


 Understand the Web architecture and applications
 Understand client side and service side programming
 Understand how common mistakes can be bypassed and exploit the application
 Identify common application vulnerabilities

UNIT - I
The Web Security, The Web Security Problem, Risk Analysis and Best Practices
Cryptography and the Web: Cryptography and Web Security, Working Cryptographic Systems and
Protocols, Legal Restrictions on Cryptography, Digital Identification

UNIT - II
The Web’s War on Your Privacy, Privacy-Protecting Techniques, Backups and Antitheft, Web Server
Security, Physical Security for Servers, Host Security for Servers, Securing Web Applications

UNIT - III
Database Security: Recent Advances in Access Control, Access Control Models for XML, Database
Issues in Trust Management and Trust Negotiation, Security in Data Warehouses and OLAP Systems

UNIT - IV
Security Re-engineering for Databases: Concepts and Techniques, Database Watermarking for
Copyright Protection, Trustworthy Records Retention, Damage Quarantine and Recovery in Data
Processing Systems, Hippocratic Databases: Current Capabilities and

UNIT - V
Future Trends Privacy in Database Publishing: A Bayesian Perspective, Privacy-enhanced Location-
based Access Control, Efficiently Enforcing the Security and Privacy Policies in a Mobile Environment

TEXT BOOK:
1. Web Security, Privacy and Commerce Simson G Arfinkel, Gene Spafford, O’Reilly.
2. Handbook on Database security applications and trends Michael Gertz, Sushil Jajodia

125
R18 B.Tech. IT Syllabus JNTU HYDERABAD

IT712PE: HIGH PERFORMANCE COMPUTING (Professional Elective - IV)

IV Year B.Tech. IT I - Sem L T P C


3 0 0 3
Prerequisites:
 Computer Organization & Architecture
 Operating System Programming

Course Objectives:
 To Improve the system performance
 To learn various distributed and parallel computing architecture
 To learn different computing technologies

Course Outcomes:
 Understanding the concepts in grid computing
 Ability to set up cluster and run parallel applications
 Ability to understand the cluster projects and cluster OS
 Understanding the concepts of pervasive computing & quantum computing.

UNIT - I
Grid Computing: Data & Computational Grids, Grid Architectures And Its Relations To Various
Distributed Technologies. Autonomic Computing, Examples Of The Grid Computing Efforts (Ibm).

UNIT - II
Cluster Setup & Its Advantages, Performance Models & Simulations; Networking Protocols & I/O,
Messaging Systems. Process Scheduling, Load Sharing And Balancing; Distributed Shared Memory,
Parallel I/O.

UNIT - III:
Example Cluster System – Beowlf; Cluster Operating Systems: Compas And Nanos
Pervasive Computing Concepts & Scenarios; Hardware & Software; Human – Machine Interface.

UNIT- IV
Device Connectivity; Java for Pervasive Devices; Application Examples.

UNIT - V
Classical Vs Quantum Logic Gates; One, Two & Three Qubit Quantum Gates; Fredkin & Toffoli
Gates; Quantum Circuits; Quantum Algorithms.

TEXT BOOK:
1. “Selected Topics In Advanced Computing” Edited By Dr. P. Padmanabham And Dr. M.B.
Srinivas, 2005 Pearson Education.

REFERENCE BOOKS:
1. J. Joseph & C. Fellenstien: ‘Grid Computing ‘, Pearson Education
2. J. Burkhardt et.al: ‘pervasive computing’ Pearson Education
3. Marivesar:’ Approaching quantum computing’, Pearson Education.
4. Raj kumar Buyya:’High performance cluster computing’, Pearson Education.
5. Neilsen & Chung L:’ Quantum computing and Quantum Information’, Cambridge University
Press.
6. A networking approach to Grid Computing, Minoli, Wiley

126
R18 B.Tech. IT Syllabus JNTU HYDERABAD

CS713PE: ARTIFICIAL INTELLIGENCE (Professional Elective - IV)

IV Year B.Tech. IT I -Sem L T P C


3 0 0 3
Prerequisites:
1. A course on “Computer Programming and Data Structures”
2. A course on “Advanced Data Structures”
3. A course on “Design and Analysis of Algorithms”
4. A course on “Mathematical Foundations of Computer Science”
5. Some background in linear algebra, data structures and algorithms, and probability will all be
helpful

Course Objectives:
 To learn the distinction between optimal reasoning Vs. human like reasoning
 To understand the concepts of state space representation, exhaustive search, heuristic search
together with the time and space complexities.
 To learn different knowledge representation techniques.
 To understand the applications of AI, namely game playing, theorem proving, and machine
learning.

Course Outcomes:
 Ability to formulate an efficient problem space for a problem expressed in natural language.
 Select a search algorithm for a problem and estimate its time and space complexities.
 Possess the skill for representing knowledge using the appropriate technique for a given
problem.
 Possess the ability to apply AI techniques to solve problems of game playing, and machine
learning.

UNIT - I
Problem Solving by Search-I: Introduction to AI, Intelligent Agents
Problem Solving by Search –II: Problem-Solving Agents, Searching for Solutions, Uninformed Search
Strategies: Breadth-first search, Uniform cost search, Depth-first search, Iterative deepening Depth-first
search, Bidirectional search, Informed (Heuristic) Search Strategies: Greedy best-first search, A*
search, Heuristic Functions, Beyond Classical Search: Hill-climbing search, Simulated annealing
search, Local Search in Continuous Spaces, Searching with Non-Deterministic Actions, Searching wih
Partial Observations, Online Search Agents and Unknown Environment .

UNIT - II
Problem Solving by Search-II and Propositional Logic
Adversarial Search: Games, Optimal Decisions in Games, Alpha–Beta Pruning, Imperfect Real-Time
Decisions.
Constraint Satisfaction Problems: Defining Constraint Satisfaction Problems, Constraint
Propagation, Backtracking Search for CSPs, Local Search for CSPs, The Structure of Problems.
Propositional Logic: Knowledge-Based Agents, The Wumpus World, Logic, Propositional Logic,
Propositional Theorem Proving: Inference and proofs, Proof by resolution, Horn clauses and definite
clauses, Forward and backward chaining, Effective Propositional Model Checking, Agents Based on
Propositional Logic.

UNIT - III
Logic and Knowledge Representation
First-Order Logic: Representation, Syntax and Semantics of First-Order Logic, Using First-Order
Logic, Knowledge Engineering in First-Order Logic.

127
R18 B.Tech. IT Syllabus JNTU HYDERABAD

Inference in First-Order Logic: Propositional vs. First-Order Inference, Unification and Lifting,
Forward Chaining, Backward Chaining, Resolution.
Knowledge Representation: Ontological Engineering, Categories and Objects, Events. Mental Events
and Mental Objects, Reasoning Systems for Categories, Reasoning with Default Information.

UNIT - IV
Planning
Classical Planning: Definition of Classical Planning, Algorithms for Planning with State-Space Search,
Planning Graphs, other Classical Planning Approaches, Analysis of Planning approaches.
Planning and Acting in the Real World: Time, Schedules, and Resources, Hierarchical Planning,
Planning and Acting in Nondeterministic Domains, Multi agent Planning.

UNIT - V
Uncertain knowledge and Learning
Uncertainty: Acting under Uncertainty, Basic Probability Notation, Inference Using Full Joint
Distributions, Independence, Bayes’ Rule and Its Use,
Probabilistic Reasoning: Representing Knowledge in an Uncertain Domain, The Semantics of
Bayesian Networks, Efficient Representation of Conditional Distributions, Approximate Inference in
Bayesian Networks, Relational and First-Order Probability, Other Approaches to Uncertain Reasoning;
Dempster-Shafer theory.
Learning: Forms of Learning, Supervised Learning, Learning Decision Trees. Knowledge in Learning:
Logical Formulation of Learning, Knowledge in Learning, Explanation-Based Learning, Learning Using
Relevance Information, Inductive Logic Programming.

TEXT BOOK:
1. Artificial Intelligence A Modern Approach, Third Edition, Stuart Russell and Peter Norvig,
Pearson Education.

REFERENCE BOOKS:
1. Artificial Intelligence, 3rd Edn, E. Rich and K. Knight (TMH)
2. Artificial Intelligence, 3rd Edn., Patrick Henny Winston, Pearson Education.
3. Artificial Intelligence, Shivani Goel, Pearson Education.
4. Artificial Intelligence and Expert systems – Patterson, Pearson Education.

128
R18 B.Tech. IT Syllabus JNTU HYDERABAD

CS714PE: CLOUD COMPUTING (Professional Elective - IV)

IV Year B.Tech. IT I -Sem L T P C


3 0 0 3
Pre-requisites:
1. A course on “Computer Networks”
2. A course on “Operating Systems”
3. A course on “Distributed Systems”

Course Objectives:
 This course provides an insight into cloud computing
 Topics covered include- distributed system models, different cloud service models, service-
oriented architectures, cloud programming and software environments, resource management.

Course Outcomes:
 Ability to understand various service delivery models of a cloud computing architecture.
 Ability to understand the ways in which the cloud can be programmed and deployed.
 Understanding cloud service providers.

UNIT - I
Computing Paradigms: High-Performance Computing, Parallel Computing, Distributed Computing,
Cluster Computing, Grid Computing, Cloud Computing, Bio computing, Mobile Computing, Quantum
Computing, Optical Computing, Nano computing.

UNIT - II
Cloud Computing Fundamentals: Motivation for Cloud Computing, The Need for Cloud Computing,
Defining Cloud Computing, Definition of Cloud computing, Cloud Computing Is a Service, Cloud
Computing Is a Platform, Principles of Cloud computing, Five Essential Characteristics, Four Cloud
Deployment Models

UNIT - III
Cloud Computing Architecture and Management: Cloud architecture, Layer, Anatomy of the Cloud,
Network Connectivity in Cloud Computing, Applications, on the Cloud, Managing the Cloud, Managing
the Cloud Infrastructure Managing the Cloud application, Migrating Application to Cloud, Phases of
Cloud Migration Approaches for Cloud Migration.

UNIT - IV
Cloud Service Models: Infrastructure as a Service, Characteristics of IaaS. Suitability of IaaS, Pros
and Cons of IaaS, Summary of IaaS Providers, Platform as a Service, Characteristics of PaaS,
Suitability of PaaS, Pros and Cons of PaaS, Summary of PaaS Providers, Software as a Service,
Characteristics of SaaS, Suitability of SaaS, Pros and Cons of SaaS, Summary of SaaS Providers,
Other Cloud Service Models.

UNIT - V
Cloud Service Providers: EMC, EMC IT, Captiva Cloud Toolkit, Google, Cloud Platform, Cloud
Storage, Google Cloud Connect, Google Cloud Print, Google App Engine, Amazon Web Services,
Amazon Elastic Compute Cloud, Amazon Simple Storage Service, Amazon Simple Queue ,service,
Microsoft, Windows Azure, Microsoft Assessment and Planning Toolkit, SharePoint, IBM, Cloud
Models, IBM Smart Cloud, SAP Labs, SAP HANA Cloud Platform, Virtualization Services Provided by
SAP, Sales force, Sales Cloud, Service Cloud: Knowledge as a Service, Rack space, VMware, Manjra
soft, Aneka Platform

129
R18 B.Tech. IT Syllabus JNTU HYDERABAD

TEXT BOOK:
1. Essentials of cloud Computing: K. Chandrasekhran, CRC press, 2014

REFERENCE BOOKS:
1. Cloud Computing: Principles and Paradigms by Rajkumar Buyya, James Broberg and Andrzej
M. Goscinski, Wiley, 2011.
2. Distributed and Cloud Computing, Kai Hwang, Geoffery C. Fox, Jack J. Dongarra, Elsevier,
2012.
3. Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance, Tim Mather,
Subra Kumaraswamy, Shahed Latif, O’Reilly, SPD, rp 2011.

130
R18 B.Tech. IT Syllabus JNTU HYDERABAD

CS715PE: AD-HOC & SENSOR NETWORKS (Professional Elective - IV)

IV Year B.Tech. IT I -Sem L T P C


3 0 0 3
Prerequisites
1. A course on “Computer Networks”
2. A course on “Mobile Computing”

Course Objectives:
 To understand the concepts of sensor networks
 To understand the MAC and transport protocols for ad hoc networks
 To understand the security of sensor networks
 To understand the applications of adhoc and sensor networks

Course Outcomes:
 Ability to understand the state-of-the-art research in the emerging subject of Ad Hoc and
Wireless Sensor Networks
 Ability to solve the issues in real-time application development based on ASN.
 Ability to conduct further research in the domain of ASN

UNIT - I
Introduction to Ad Hoc Networks - Characteristics of MANETs, Applications of MANETs and
Challenges of MANETs.
Routing in MANETs - Criteria for classification, Taxonomy of MANET routing algorithms, Topology-
based routing algorithms-Proactive: DSDV; Reactive: DSR, AODV; Hybrid: ZRP; Position-based
routing algorithms-Location Services-DREAM, Quorum-based; Forwarding Strategies: Greedy
Packet, Restricted Directional Flooding-DREAM, LAR.

UNIT - II
Data Transmission - Broadcast Storm Problem, Rebroadcasting Schemes-Simple-flooding,
Probability-based Methods, Area-based Methods, Neighbor Knowledge-based: SBA, Multipoint
Relaying, AHBP. Multicasting: Tree-based: AMRIS, MAODV; Mesh-based: ODMRP, CAMP;
Hybrid: AMRoute, MCEDAR.

UNIT - III
Geocasting: Data-transmission Oriented-LBM; Route Creation Oriented-GeoTORA, MGR.
TCP over Ad Hoc TCP protocol overview, TCP and MANETs, Solutions for TCP over Ad hoc

UNIT - IV
Basics of Wireless, Sensors and Lower Layer Issues: Applications, Classification of sensor
networks, Architecture of sensor network, Physical layer, MAC layer, Link layer, Routing Layer.

UNIT - V
Upper Layer Issues of WSN: Transport layer, High-level application layer support, Adapting to the
inherent dynamic nature of WSNs, Sensor Networks and mobile robots.

TEXT BOOKS:
1. Ad Hoc and Sensor Networks – Theory and Applications, Carlos Corderio Dharma P. Aggarwal,
World Scientific Publications, March 2006, ISBN – 981–256–681–3.
2. Wireless Sensor Networks: An Information Processing Approach, Feng Zhao, Leonidas
Guibas, Elsevier Science, ISBN – 978-1-55860-914-3 (Morgan Kauffman).

131
R18 B.Tech. IT Syllabus JNTU HYDERABAD

IT721PE: INTRUSION DETECTION SYSTEMS (Professional Elective - V)

IV Year B.Tech. IT I - Sem L T P C


3 0 0 3
Prerequisites: Computer Networks, Computer Programming

Course Objectives:
 Compare alternative tools and approaches for Intrusion Detection through quantitative analysis
to determine the best tool or approach to reduce risk from intrusion.
 Identify and describe the parts of all intrusion detection systems and characterize new and
emerging IDS technologies according to the basic capabilities all intrusion detection systems
share.

Course Outcomes: After completion of the course, students will be able to:
 Possess a fundamental knowledge of Cyber Security.
 Understand what vulnerability is and how to address most common vulnerabilities.
 Know basic and fundamental risk management principles as it relates to Cyber Security and
Mobile Computing.
 Have the knowledge needed to practice safer computing and safeguard your information using
Digital Forensics.
 Understand basic technical controls in use today, such as firewalls and Intrusion Detection
systems.
 Understand legal perspectives of Cyber Crimes and Cyber Security.

UNIT - I
The state of threats against computers, and networked systems-Overview of computer security
solutions and why they fail-Vulnerability assessment, firewalls, VPN’s -Overview of Intrusion Detection
and Intrusion Prevention, Network and Host-based IDS

UNIT - II
Classes of attacks - Network layer: scans, denial of service, penetration Application layer: software
exploits, code injection-Human layer: identity theft, root access-Classes of attackers-Kids/hackers/sop
Hesitated groups-Automated: Drones, Worms, Viruses

UNIT - III
A General IDS model and taxonomy, Signature-based Solutions, Snort, Snort rules, Evaluation of IDS,
Cost sensitive IDS

UNIT - IV
Anomaly Detection Systems and Algorithms-Network Behaviour Based Anomaly Detectors (rate
based)-Host-based Anomaly Detectors-Software Vulnerabilities-State transition, Immunology, Payload
Anomaly Detection

UNIT - V
Attack trees and Correlation of alerts- Autopsy of Worms and Botnets-Malware detection -Obfuscation,
polymorphism- Document vectors.
Email/IM security issues-Viruses/Spam-From signatures to thumbprints to zero day detection-Insider
Threat issues-Taxonomy-Masquerade and Impersonation Traitors, Decoys and Deception-Future:
Collaborative Security

132
R18 B.Tech. IT Syllabus JNTU HYDERABAD

TEXT BOOKS:
1. Peter Szor, The Art of Computer Virus Research and Defense, Symantec Press ISBN 0-321-
30545-3.
2. Markus Jakobsson and Zulfikar Ramzan, Crimeware, Understanding New Attacks and
Defenses.

REFERENCE BOOKS:
1. Saiful Hasan, Intrusion Detection System, Kindle Edition.
2. Ankit Fadia, Intrusion Alert: An Ethical Hacking Guide to Intrusion Detection.

Online Websites/Materials:
1. https://www.intechopen.com/books/intrusion-detection-systems/

Online Courses:
1. https://www.sans.org/course/intrusion-detection-in-depth
2. https://www.cybrary.it/skill-certification-course/ids-ips-certification-training-course

133
R18 B.Tech. IT Syllabus JNTU HYDERABAD

CS722PE: REAL TIME SYSTEMS (Professional Elective - V)

IV Year B.Tech. IT I -Sem L T P C


3 0 0 3
Prerequisite: Computer Organization and Operating System

Course Objectives:
 To provide broad understanding of the requirements of Real Time Operating Systems.
 To make the student understand, applications of these Real Time features using case
studies.

Course Outcomes:
 Be able to explain real-time concepts such as preemptive multitasking, task priorities, priority
inversions, mutual exclusion, context switching, and synchronization, interrupt latency and
response time, and semaphores.
 Able describe how a real-time operating system kernel is implemented.
 Able explain how tasks are managed.
 Explain how the real-time operating system implements time management.
 Discuss how tasks can communicate using semaphores, mailboxes, and queues.
 Be able to implement a real-time system on an embedded processor.
 Be able to work with real time operating systems like RT Linux, Vx Works, MicroC /OSII, Tiny
Os

UNIT – I
Introduction: Introduction to UNIX/LINUX, Overview of Commands, File I/O,( open, create, close,
lseek, read, write), Process Control ( fork, vfork, exit, wait, waitpid, exec).

UNIT - II
Real Time Operating Systems: Brief History of OS, Defining RTOS, The Scheduler, Objects, Services,
Characteristics of RTOS, Defining a Task, asks States and Scheduling, Task Operations, Structure,
Synchronization, Communication and Concurrency. Defining Semaphores, Operations and Use,
Defining Message Queue, States, Content, Storage, Operations and Use

UNIT - III
Objects, Services and I/O: Pipes, Event Registers, Signals, Other Building Blocks, Component
Configuration, Basic I/O Concepts, I/O Subsystem

UNIT - IV
Exceptions, Interrupts and Timers: Exceptions, Interrupts, Applications, Processing of Exceptions
and Spurious Interrupts, Real Time Clocks, Programmable Timers, Timer Interrupt Service Routines
(ISR), Soft Timers, Operations.

UNIT - V
Case Studies of RTOS: RT Linux, MicroC/OS-II, Vx Works, Embedded Linux, and Tiny OS.

TEXT BOOK:
1. Real Time Concepts for Embedded Systems – Qing Li, Elsevier, 2011

REFERENCE BOOKS:
1. Embedded Systems- Architecture, Programming and Design by Rajkamal, 2007, TMH.
2. Advanced UNIX Programming, Richard Stevens
3. Embedded Linux: Hardware, Software and Interfacing – Dr. Craig Hollabaugh

134
R18 B.Tech. IT Syllabus JNTU HYDERABAD

CS723PE: SOFT COMPUTING (Professional Elective - V)


IV Year B.Tech. IT I -Sem L T P C
3 0 0 3
Course Objectives:
 Familiarize with soft computing concepts
 Introduce and use the idea of fuzzy logic and use of heuristics based on human experience
 Familiarize the Neuro-Fuzzy modeling using Classification and Clustering techniques
 Learn the concepts of Genetic algorithm and its applications
 Acquire the knowledge of Rough Sets.
Course Outcomes: On completion of this course, the students will be able to:
 Identify the difference between Conventional Artificial Intelligence to Computational
Intelligence.
 Understand fuzzy logic and reasoning to handle and solve engineering problems
 Apply the Classification and clustering techniques on various applications.
 Understand the advanced neural networks and its applications
 Perform various operations of genetic algorithms, Rough Sets.
 Comprehend various techniques to build model for various applications

UNIT - I
Introduction to Soft Computing: Evolutionary Computing, "Soft" computing versus "Hard" computing,
Soft Computing Methods, Recent Trends in Soft Computing, Characteristics of Soft computing,
Applications of Soft Computing Techniques.

UNIT -II
Fuzzy Systems: Fuzzy Sets, Fuzzy Relations, Fuzzy Logic, Fuzzy Rule-Based Systems

UNIT -III
Fuzzy Decision Making, Particle Swarm Optimization

UNIT -IV
Genetic Algorithms: Basic Concepts, Basic Operators for Genetic Algorithms, Crossover and Mutation
Properties, Genetic Algorithm Cycle, Fitness Function, Applications of Genetic Algorithm.

UNIT -V
Rough Sets, Rough Sets, Rule Induction, and Discernibility Matrix, Integration of Soft Computing
Techniques.

TEXT BOOK:
1. Soft Computing – Advances and Applications - Jan 2015 by B.K. Tripathy and J. Anuradha –
Cengage Learning

REFERENCE BOOKS:
1. S. N. Sivanandam & S. N. Deepa, “Principles of Soft Computing”, 2nd edition, Wiley India, 2008.
2. David E. Goldberg, “Genetic Algorithms-In Search, optimization and Machine learning”,
Pearson Education.
3. J. S. R. Jang, C.T. Sun and E.Mizutani, “Neuro-Fuzzy and Soft Computing”, Pearson
Education, 2004.
4. G.J. Klir & B. Yuan, “Fuzzy Sets & Fuzzy Logic”, PHI, 1995.
5. Melanie Mitchell, “An Introduction to Genetic Algorithm”, PHI, 1998.
6. Timothy J. Ross, “Fuzzy Logic with Engineering Applications”, McGraw- Hill International
editions, 1995

135
R18 B.Tech. IT Syllabus JNTU HYDERABAD

IT724PE: DISTRIBUTED DATABASES (Professional Elective - V)

IV Year B.Tech. IT I-Sem L T P C


3 0 0 3
Prerequisites:
1. A course on “Database Management Systems”

Course Objectives:
 The purpose of the course is to enrich the previous knowledge of database systems and
exposing the need for distributed database technology to confront with the deficiencies of the
centralized database systems.
 Introduce basic principles and implementation techniques of distributed database systems.
 Equip students with principles and knowledge of parallel and object-oriented databases.
 Topics include distributed DBMS architecture and design; query processing and optimization;
distributed transaction management and reliability; parallel and object database management
systems.

Course Outcomes:
 Understand theoretical and practical aspects of distributed database systems.
 Study and identify various issues related to the development of distributed database system.
 Understand the design aspects of object-oriented database system and related development.

UNIT - I
Introduction; Distributed Data Processing, Distributed Database System, Promises of DDBSs,
Problem areas.
Distributed DBMS Architecture: Architectural Models for Distributed DBMS, DDMBS Architecture.
Distributed Database Design: Alternative Design Strategies, Distribution Design issues,
Fragmentation, Allocation.

UNIT - II
Query processing and decomposition: Query processing objectives, characterization of query
processors, layers of query processing, query decomposition, localization of distributed data.
Distributed query Optimization: Query optimization, centralized query optimization, distributed query
optimization algorithms.

UNIT - III
Transaction Management: Definition, properties of transaction, types of transactions, distributed
concurrency control: serializability, concurrency control mechanisms & algorithms, time - stamped &
optimistic concurrency control Algorithms, deadlock Management.

UNIT - IV
Distributed DBMS Reliability: Reliability concepts and measures, fault-tolerance in distributed
systems, failures in Distributed DBMS, local & distributed reliability protocols, site failures and network
partitioning.
Parallel Database Systems: Parallel database system architectures, parallel data placement, parallel
query processing, load balancing, database clusters.

UNIT - V
Distributed object Database Management Systems: Fundamental object concepts and models,
object distributed design, architectural issues, object management, distributed object storage, object
query Processing.

136
R18 B.Tech. IT Syllabus JNTU HYDERABAD

Object Oriented Data Model: Inheritance, object identity, persistent programming languages,
persistence of objects, comparison OODBMS and ORDBMS

TEXT BOOKS:
1. M. Tamer OZSU and Patuck Valduriez: Principles of Distributed Database Systems, Pearson
Edn. Asia, 2001.
2. Stefano Ceri and Giuseppe Pelagatti: Distributed Databases, McGraw Hill.

REFERENCE BOOK:
1. Hector Garcia-Molina, Jeffrey D. Ullman, Jennifer Widom: “Database Systems: The Complete
Book”, Second Edition, Pearson International Edition

137
R18 B.Tech. IT Syllabus JNTU HYDERABAD

CS725PE: SOFTWARE PROCESS & PROJECT MANAGEMENT (Professional Elective - V)

IV Year B.Tech. IT I -Sem L T P C


3 0 0 3
Course Objectives:
 To acquire knowledge on software process management
 To acquire managerial skills for software project development
 To understand software economics

Course Outcomes:
 Gain knowledge of software economics, phases in the life cycle of software development,
project organization, project control and process instrumentation
 Analyze the major and minor milestones, artifacts and metrics from management and technical
perspective
 Design and develop software product using conventional and modern principles of software
project management

UNIT - I
Software Process Maturity
Software maturity Framework, Principles of Software Process Change, Software Process Assessment,
The Initial Process, The Repeatable Process, The Defined Process, The Managed Process, The
Optimizing Process.
Process Reference Models
Capability Maturity Model (CMM), CMMI, PCMM, PSP, TSP).

UNIT - II
Software Project Management Renaissance
Conventional Software Management, Evolution of Software Economics, Improving Software
Economics, The old way and the new way.
Life-Cycle Phases and Process artifacts
Engineering and Production stages, inception phase, elaboration phase, construction phase, transition
phase, artifact sets, management artifacts, engineering artifacts and pragmatic artifacts, model-based
software architectures.

UNIT - III
Workflows and Checkpoints of process
Software process workflows, Iteration workflows, Major milestones, minor milestones, periodic status
assessments.
Process Planning
Work breakdown structures, Planning guidelines, cost and schedule estimating process, iteration
planning process, Pragmatic planning.

UNIT - IV
Project Organizations
Line-of- business organizations, project organizations, evolution of organizations, process automation.
Project Control and process instrumentation
The seven-core metrics, management indicators, quality indicators, life-cycle expectations, Pragmatic
software metrics, metrics automation.

UNIT - V
CCPDS-R Case Study and Future Software Project Management Practices
Modern Project Profiles, Next-Generation software Economics, Modern Process Transitions.

138
R18 B.Tech. IT Syllabus JNTU HYDERABAD

TEXT BOOKS:
1. Managing the Software Process, Watts S. Humphrey, Pearson Education
2. Software Project Management, Walker Royce, Pearson Education

REFERENCE BOOKS:
1. An Introduction to the Team Software Process, Watts S. Humphrey, Pearson Education, 2000
2. Process Improvement essentials, James R. Persse, O’Reilly, 2006
3. Software Project Management, Bob Hughes & Mike Cotterell, fourth edition, TMH, 2006
4. Applied Software Project Management, Andrew Stellman & Jennifer Greene, O’Reilly, 2006.
5. Head First PMP, Jennifer Greene & Andrew Stellman, O’Reilly, 2007
6. Software Engineering Project Management, Richard H. Thayer & Edward Yourdon,
2nd edition, Wiley India, 2004.
7. Agile Project Management, Jim Highsmith, Pearson education, 2004.

139
R18 B.Tech. IT Syllabus JNTU HYDERABAD

IT703PC: INFORMATION SECURITY LAB

IV Year B.Tech. IT I -Sem L T P C


0 0 2 1

List of Experiments:
1. Write a C program that contains a string (char pointer) with a value ‘Hello world’. The program
should XOR each character in this string with 0 and displays the result.

2. Write a C program that contains a string (char pointer) with a value ‘Hello world’. The program
should AND or and XOR each character in this string with 127 and display the result.

3. Write a Java program to perform encryption and decryption using the following algorithms
a. Ceaser cipher b. Substitution cipher c. Hill Cipher

4. Write a C/JAVA program to implement the DES algorithm logic.

5. Write a C/JAVA program to implement the Blowfish algorithm logic.

6. Write a C/JAVA program to implement the Rijndael algorithm logic.

7. Write the RC4 logic in Java Using Java cryptography; encrypt the text “Hello world” using
Blowfish. Create your own key using Java key tool.

8. Write a Java program to implement RSA algorithm.

9. Implement the Diffie-Hellman Key Exchange mechanism using HTML and JavaScript.

10. Calculate the message digest of a text using the SHA-1 algorithm in JAVA.

11. Calculate the message digest of a text using the MD5 algorithm in JAVA.

140
R18 B.Tech. IT Syllabus JNTU HYDERABAD

SM801MS: ORGANIZATIONAL BEHAVIOUR

IV Year B.Tech. IT II - Sem L T P C


3 0 0 3
Course Objectives: The objective of the course is to provide the students with the conceptual
framework and the theories underlying Organizational Behaviour.

UNIT - I:
Introduction to OB - Definition, Nature and Scope – Environmental and organizational context – Impact
of IT, globalization, Diversity, Ethics, culture, reward systems and organizational design on
Organizational Behaviour. Cognitive Processes-I: Perception and Attribution: Nature and importance of
Perception – Perceptual selectivity and organization – Social perception – Attribution Theories – Locus
of control –Attribution Errors –Impression Management.

UNIT- II:
Cognitive Processes-II: Personality and Attitudes – Personality as a continuum – Meaning of personality
- Johari Window and Transactional Analysis - Nature and Dimension of Attitudes – Job satisfaction and
organizational commitment-Motivational needs and processes- Work-Motivation Approaches Theories
of Motivation- Motivation across cultures - Positive organizational behaviour: Optimism – Emotional
intelligence – Self-Efficacy.

UNIT - III:
Dynamics of OB-I: Communication – types – interactive communication in organizations – barriers to
communication and strategies to improve the follow of communication - Decision Making: Participative
decision-making techniques – creativity and group decision making. Dynamics of OB –II Stress and
Conflict: Meaning and types of stress –Meaning and types of conflict - Effect of stress and intra-
individual conflict - strategies to cope with stress and conflict.

UNIT - IV:
Dynamics of OB –III Power and Politics: Meaning and types of power – empowerment - Groups Vs.
Teams – Nature of groups – dynamics of informal groups – dysfunctions of groups and teams – teams
in modern work place.

UNIT - V:
Leading High performance: Job design and Goal setting for High performance- Quality of Work Life-
Socio technical Design and High-performance work practices - Behavioural performance management:
reinforcement and punishment as principles of Learning –Process of Behavioural modification -
Leadership theories - Styles, Activities and skills of Great leaders.

REFERENCE BOOKS:
1. Luthans, Fred: Organizational Behaviour 10/e, McGraw-Hill, 2009
2. McShane: Organizational Behaviour, 3e, TMH, 2008
3. Nelson: Organizational Behaviour, 3/e, Thomson, 2008.
4. Newstrom W. John & Davis Keith, Organisational Behaviour-- Human Behaviour at Work, 12/e,
TMH, New Delhi, 2009.
5. Pierce and Gardner: Management and Organisational Behaviour: An Integrated perspective,
Thomson, 2009.
6. Robbins, P. Stephen, Timothy A. Judge: Organisational Behaviour, 12/e, PHI/Pearson, New
Delhi, 2009.
7. Pareek Udai: Behavioural Process at Work: Oxford & IBH, New Delhi, 2009.
8. Schermerhorn: Organizational Behaviour 9/e, Wiley, 2008.
9. Hitt: Organizational Behaviour, Wiley, 2008

141
R18 B.Tech. IT Syllabus JNTU HYDERABAD

10. Aswathappa: Organisational Behaviour, 7/e, Himalaya, 2009


11. Mullins: Management and Organisational Behaviour, Pearson, 2008.
12. McShane, Glinow: Organisational Behaviour--Essentials, TMH, 2009.
13. Ivancevich: Organisational Behaviour and Management, 7/e, TMH, 2008.

142
R18 B.Tech. IT Syllabus JNTU HYDERABAD

IT811PE: NATURAL LANGUAGE PROCESSING (Professional Elective - VI)

IV Year B.Tech. IT II - Sem L T P C


3 0 0 3
Prerequisites: Data structures, finite automata and probability theory

Course Objectives:
 Introduce to some of the problems and solutions of NLP and their relation to linguistics and
statistics.

Course Outcomes:
 Show sensitivity to linguistic phenomena and an ability to model them with formal grammars.
 Understand and carry out proper experimental methodology for training and evaluating
empirical NLP systems
 Able to manipulate probabilities, construct statistical models over strings and trees, and
estimate parameters using supervised and unsupervised training methods.
 Able to design, implement, and analyze NLP algorithms
 Able to design different language modeling Techniques.

UNIT - I
Finding the Structure of Words: Words and Their Components, Issues and Challenges,
Morphological Models
Finding the Structure of Documents: Introduction, Methods, Complexity of the Approaches,
Performances of the Approaches

UNIT - II
Syntax Analysis: Parsing Natural Language, Treebanks: A Data-Driven Approach to Syntax,
Representation of Syntactic Structure, Parsing Algorithms, Models for Ambiguity Resolution in Parsing,
Multilingual Issues

UNIT - III
Semantic Parsing: Introduction, Semantic Interpretation, System Paradigms, Word Sense
Systems, Software.

UNIT - IV
Predicate-Argument Structure, Meaning Representation Systems, Software.

UNIT - V
Discourse Processing: Cohension, Reference Resolution, Discourse Cohension and Structure
Language Modeling: Introduction, N-Gram Models, Language Model Evaluation, Parameter
Estimation, Language Model Adaptation, Types of Language Models, Language-Specific Modeling
Problems, Multilingual and Crosslingual Language Modeling

TEXT BOOKS:
1. Multilingual natural Language Processing Applications: From Theory to Practice – Daniel M.
Bikel and Imed Zitouni, Pearson Publication
2. Natural Language Processing and Information Retrieval: Tanvier Siddiqui, U.S. Tiwary

REFERENCE BOOK:
1. Speech and Natural Language Processing - Daniel Jurafsky & James H Martin, Pearson
Publications

143
R18 B.Tech. IT Syllabus JNTU HYDERABAD

CS812PE: DISTRIBUTED SYSTEMS (Professional Elective - VI)

IV Year B.Tech. IT II -Sem L T P C


3 0 0 3
Prerequisites:
1. A course on “Operating Systems”
2. A course on “Computer Organization & Architecture”

Course Objectives:
 This course provides an insight into Distributed systems.
 Topics include- Peer to Peer Systems, Transactions and Concurrency control, Security and
Distributed shared memory

Course Outcomes:
 Ability to understand Transactions and Concurrency control.
 Ability to understand Security issues.
 Understanding Distributed shared memory.
 Ability to design distributed systems for basic level applications.

UNIT - I
Characterization of Distributed Systems-Introduction, Examples of Distributed systems, Resource
sharing and web, challenges, System models -Introduction, Architectural and Fundamental models,
Networking and Internetworking, Interprocess Communication, Distributed objects and Remote
Invocation-Introduction, Communication between distributed objects, RPC, Events and notifications,
Case study-Java RMI.

UNIT - II
Operating System Support- Introduction, OS layer, Protection, Processes and Threads, Communication
and Invocation, Operating system architecture, Distributed File Systems-Introduction, File Service
architecture.

UNIT - III
Peer to Peer Systems–Introduction, Napster and its legacy, Peer to Peer middleware, Routing overlays,
Overlay case studies-Pastry, Tapestry, Application case studies-Squirrel, OceanStore.
Time and Global States-Introduction, Clocks, events and Process states, Synchronizing physical
clocks, logical time and logical clocks, global states, distributed debugging.
Coordination and Agreement-Introduction, Distributed mutual exclusion, Elections, Multicast
communication, consensus and related problems.

UNIT - IV
Transactions and Concurrency Control-Introduction, Transactions, Nested Transactions, Locks,
Optimistic concurrency control, Timestamp ordering. Distributed Transactions-Introduction, Flat and
Nested Distributed Transactions, Atomic commit protocols, Concurrency control in distributed
transactions, Distributed deadlocks, Transaction recovery.

UNIT - V
Replication-Introduction, System model and group communication, Fault tolerant services,
Transactions with replicated data.
Distributed shared memory, Design and Implementation issues, Consistency models.

144
R18 B.Tech. IT Syllabus JNTU HYDERABAD

TEXT BOOKS:
1. Distributed Systems Concepts and Design, G Coulouris, J Dollimore and T Kindberg, Fourth
Edition, Pearson Education.
2. Distributed Systems, S. Ghosh, Chapman & Hall/CRC, Taylor & Francis Group, 2010.

REFERENCE BOOKS:
1. Distributed Systems – Principles and Paradigms, A.S. Tanenbaum and M.V. Steen, Pearson
Education.
2. Distributed Computing, Principles, Algorithms and Systems, Ajay D. Kshemakalyani and
Mukesh Singhal, Cambridge, rp 2010.

145
R18 B.Tech. IT Syllabus JNTU HYDERABAD

CS813PE: NEURAL NETWORKS & DEEP LEARNING (Professional Elective - VI)

IV Year B.Tech. IT II -Sem L T P C


3 0 0 3
Course Objectives:
 To introduce the foundations of Artificial Neural Networks
 To acquire the knowledge on Deep Learning Concepts
 To learn various types of Artificial Neural Networks
 To gain knowledge to apply optimization strategies

Course Outcomes:
 Ability to understand the concepts of Neural Networks
 Ability to select the Learning Networks in modeling real world systems
 Ability to use an efficient algorithm for Deep Models
 Ability to apply optimization strategies for large scale applications

UNIT-I
Artificial Neural Networks Introduction, Basic models of ANN, important terminologies, Supervised
Learning Networks, Perceptron Networks, Adaptive Linear Neuron, Back-propagation Network.
Associative Memory Networks. Training Algorithms for pattern association, BAM and Hopfield
Networks.

UNIT-II
Unsupervised Learning Network- Introduction, Fixed Weight Competitive Nets, Maxnet, Hamming
Network, Kohonen Self-Organizing Feature Maps, Learning Vector Quantization, Counter Propagation
Networks, Adaptive Resonance Theory Networks. Special Networks-Introduction to various networks.

UNIT - III
Introduction to Deep Learning, Historical Trends in Deep learning, Deep Feed - forward networks,
Gradient-Based learning, Hidden Units, Architecture Design, Back-Propagation and Other
Differentiation Algorithms

UNIT - IV
Regularization for Deep Learning: Parameter norm Penalties, Norm Penalties as Constrained
Optimization, Regularization and Under-Constrained Problems, Dataset Augmentation, Noise
Robustness, Semi-Supervised learning, Multi-task learning, Early Stopping, Parameter Typing and
Parameter Sharing, Sparse Representations, Bagging and other Ensemble Methods, Dropout,
Adversarial Training, Tangent Distance, tangent Prop and Manifold, Tangent Classifier

UNIT - V
Optimization for Train Deep Models: Challenges in Neural Network Optimization, Basic Algorithms,
Parameter Initialization Strategies, Algorithms with Adaptive Learning Rates, Approximate Second-
Order Methods, Optimization Strategies and Meta-Algorithms
Applications: Large-Scale Deep Learning, Computer Vision, Speech Recognition, Natural Language
Processing

TEXT BOOKS:
1. Deep Learning: An MIT Press Book By Ian Goodfellow and Yoshua Bengio and Aaron Courville
2. Neural Networks and Learning Machines, Simon Haykin, 3rd Edition, Pearson Prentice Hall.

146
R18 B.Tech. IT Syllabus JNTU HYDERABAD

CS814PE: HUMAN COMPUTER INTERACTION (Professional Elective - VI)

IV Year B.Tech. IT II - Sem L T P C


3 0 0 3

Course Objectives: To gain an overview of Human-Computer Interaction (HCI), with an understanding


of user interface design in general, and alternatives to traditional "keyboard and mouse" computing;
become familiar with the vocabulary associated with sensory and cognitive systems as relevant to task
performance by humans; be able to apply models from cognitive psychology to predicting user
performance in various human-computer interaction tasks and recognize the limits of human
performance as they apply to computer operation; appreciate the importance of a design and evaluation
methodology that begins with and maintains a focus on the user; be familiar with a variety of both
conventional and non-traditional user interface paradigms, the latter including virtual and augmented
reality, mobile and wearable computing, and ubiquitous computing; and understand the social
implications of technology and their ethical responsibilities as engineers in the design of technological
systems. Finally, working in small groups on a product design from start to finish will provide you with
invaluable team-work experience.

Course Outcomes:
 Ability to apply HCI and principles to interaction design.
 Ability to design certain tools for blind or PH people.

UNIT - I
Introduction: Importance of user Interface – definition, importance of good design. Benefits of good
design. A brief history of Screen design.
The graphical user interface – popularity of graphics, the concept of direct manipulation, graphical
system, Characteristics, Web user – Interface popularity, characteristics- Principles of user interface.

UNIT - II
Design process – Human interaction with computers, importance of human characteristics human
consideration, Human interaction speeds, understanding business junctions.
Screen Designing: Design goals – Screen planning and purpose, organizing screen elements, ordering
of screen data and content – screen navigation and flow – Visually pleasing composition – amount of
information – focus and emphasis – presentation information simply and meaningfully – information
retrieval on web – statistical graphics – Technological consideration in interface design.

UNIT - III
Windows – New and Navigation schemes selection of window, selection of devices based and screen-
based controls. Components – text and messages, Icons and increases – Multimedia, colors, uses
problems, choosing colors.

UNIT - IV
HCI in the software process, The software life cycle Usability engineering Iterative design and
prototyping Design Focus: Prototyping in practice Design rationale Design rules Principles to support
usability Standards Golden rules and heuristics HCI patterns Evaluation techniques, Goals of
evaluation, Evaluation through expert analysis, Evaluation through user participation, Choosing an
evaluation method. Universal design, Universal design principles Multi-modal interaction

UNIT - V
Cognitive models Goal and task hierarchies Design Focus: GOMS saves money Linguistic models The
challenge of display-based systems Physical and device models Cognitive architectures Ubiquitous
computing and augmented realities Ubiquitous computing applications research Design Focus: Ambient

147
R18 B.Tech. IT Syllabus JNTU HYDERABAD

Wood – augmenting the physical Virtual and augmented reality Design Focus: Shared experience
Design Focus: Applications of augmented reality Information and data visualization Design Focus:
Getting the size right.

TEXT BOOKS:
1. The essential guide to user interface design, Wilbert O Galitz, Wiley Dream Tech. Units 1, 2, 3
2. Human – Computer Interaction. Alan Dix, Janet Fincay, Gre Goryd, Abowd, Russell Bealg,
Pearson Education Units 4,5

REFERENCE BOOKS:
1. Designing the user interface. 3rd Edition Ben Shneidermann, Pearson Education Asia.
2. Interaction Design Prece, Rogers, Sharps. Wiley Dreamtech.
3. User Interface Design, Soren Lauesen , Pearson Education.
4. Human –Computer Interaction, D. R. Olsen, Cengage Learning.
5. Human –Computer Interaction, Smith - Atakan, Cengage Learning.

148
R18 B.Tech. IT Syllabus JNTU HYDERABAD

CS815PE: CYBER FORENSICS (Professional Elective - VI)

IV Year B.Tech. IT II -Sem L T P C


3 0 0 3
Prerequisites: Network Security
Course Objectives:
 A brief explanation of the objective is to provide digital evidences which are obtained from digital
media.
 In order to understand the objectives of computer forensics, first of all, people have to recognize
the different roles computer plays in a certain crime.
 According to a snippet from the United States Security Service, the functions computer has in
different kinds of crimes.

Course Outcomes:
 Students will understand the usage of computers in forensic, and how to use various forensic
tools for a wide variety of investigations.
 It gives an opportunity to students to continue their zeal in research in computer forensics

UNIT - I
Introduction of Cybercrime: Types, The Internet spawns crime, Worms versus viruses, Computers' roles
in crimes, Introduction to digital forensics, Introduction to Incident - Incident Response Methodology –
Steps - Activities in Initial Response, Phase after detection of an incident

UNIT - II
Initial Response and forensic duplication, Initial Response & Volatile Data Collection from Windows
system -Initial Response & Volatile Data Collection from Unix system – Forensic Duplication: Forensic
duplication: Forensic Duplicates as Admissible Evidence, Forensic Duplication Tool Requirements,
Creating a Forensic. Duplicate/Qualified Forensic Duplicate of a Hard Drive

UNIT - III
Forensics analysis and validation: Determining what data to collect and analyze, validating forensic
data, addressing data-hiding techniques, performing remote acquisitions
Network Forensics: Network forensics overview, performing live acquisitions, developing standard
procedures for network forensics, using network tools, examining the honeynet project.

UNIT - IV
Current Forensic tools: evaluating computer forensic tool needs, computer forensics software tools,
computer forensics hardware tools, validating and testing forensics software E-Mail Investigations:
Exploring the role of e-mail in investigation, exploring the roles of the client and server in e-mail,
investigating e-mail crimes and violations, understanding e-mail servers, using specialized e-mail
forensic tools.
Cell phone and mobile device forensics: Understanding mobile device forensics, understanding
acquisition procedures for cell phones and mobile devices.

UNIT - V
Working with Windows and DOS Systems: understanding file systems, exploring Microsoft File
Structures, Examining NTFS disks, Understanding whole disk encryption, windows registry, Microsoft
startup tasks, MS-DOS startup tasks, virtual machines.

TEXT BOOKS:
1. Kevin Mandia, Chris Prosise, “Incident Response and computer forensics”, Tata McGraw Hill,
2006.

149
R18 B.Tech. IT Syllabus JNTU HYDERABAD

2. Computer Forensics, Computer Crime Investigation by John R. Vacca, Firewall Media, New
Delhi.
3. Computer Forensics and Investigations by Nelson, Phillips Enfinger, Steuart, CENGAGE
Learning

REFERENCE BOOKS:
1. Real Digital Forensics by Keith J. Jones, Richard Bejtiich, Curtis W. Rose, Addison- Wesley
Pearson Education
2. Forensic Compiling, A Tractitioneris Guide by Tony Sammes and Brian Jenkinson, Springer
International edition.

150

You might also like